Comodo Help
Find the desired product help
Xcitium Enterprise

Xcitium Enterprise

Xcitium Enterprise Administrator Guide

English

Print Help Download Help
Security Systems > Investigate Events > Search Events By File
  • Introduction To Xcitium Enterprise - Endpoint Protection Platform
    • Key Concepts
    • Best Practices
    • Login Into The Admin Console
    • Upgrade To Full Version
  • The Admin Console
  • The Dashboards
  • CNAPP Dashboard
  • ROI Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Device Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Network Information
        • View And Manage Profiles Associated With A Device
        • View Maintenance Windows Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Xcitium
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Xcitium
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Dragon
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • View Event Logs On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Change A Device's Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Remove A Device
      • Generate Device List Report
      • Manage Isolate And Release From Isolation
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Cloud Workloads
  • Cloud Assets
  • Cloud Security
    • View Vulnerabilities Findings
    • Registry Scan
    • CSPM Executive Dashboard
    • Compliance Summary
    • CWPP Dashboard
    • App Behavior
    • Manage Policies
    • Remediation
    • View Alerts
    • Manage Triggers
    • View Reports
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On User Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
          • Thumbnails Settings
          • Chat Settings
          • Applications Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And XcitiumClient - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • View Alerts And Security Events
      • View Alerts And Security Events By Time
      • View Alerts And Security Events By Files
      • View Alerts And Security Events By Device
      • Alert Policy
      • Suppression Rule
    • Investigate Events
      • Search Events By Query
      • Search Events By File
      • Search Events By Device
      • View Android Threat History
      • Process Timeline
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Blocked Threats
    • View And Manage Quarantined Items
    • View Contained Threats
    • View And Manage Autorun Items
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Software Inventory
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • Xcitium Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • Management Settings
    • Account Management
    • License Management
      • Manage Your Licenses
      • License Allocations
      • Bill Forecast
  • Configure Xcitium Enterprise
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • Create And Manage Tags
    • Xcitium Enterprise Portal Configuration
      • Import User Groups From LDAP
      • Configure Portal Settings
      • Configure Communication And Security Client Settings
        • Configure The Xcitium Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Xcitium Enterprise Extensions
      • Configure Xcitium Enterprise Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrator's Time Zone And Language
      • Configure Audit Log Settings
    • Dashboard Settings
    • Cloud Security Settings
      • Manage Cloud Accounts
        • Amazon Web Server (AWS) Account Onboarding
        • Google Cloud Platform (GCP) Account Onboarding
        • Microsoft Azure Account Onboarding
      • Manage Cluster
      • Configure Integrations
        • CWPP
        • CSPM
        • Registry
        • S3 Data Source
      • Create And Manage Labels
      • Create And Manage Tags
      • Create And Manage Groups
      • Configure Ticket Template
    • Data Protection Templates
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • View Version And Support Information
    • Alert Notification Settings
  • Appendix 1a - Xcitium Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Xcitium Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Pre-configured Profiles
  • Appendix 3 - Default Xcitium Security Policy Details
  • About Xcitium

Search Events by File


Click 'Security' > 'Endpoint Security' > 'Investigate' > 'Hash Search'

  • The 'Hash Search' lets you search for events involving a specific file

  • The search is executed with the SHA1 hash value of the file of interest

  • The interface also shows details about the file. This includes the file trajectory, summaries of execution of a file, creation history, download history and more on various devices

  • In usual practice, the interface can be used for file search from other interfaces like 'Alerts Search', 'Hash view' and 'Device view' under the 'Alerts' menu or 'Investigation' > 'Event Search' 

Open the 'Hash Search' interface

  • Click 'Security' > 'Endpoint Security'

  • Move your mouse over 'Investigate' and choose 'Hash search'



The interface lets you execute a search by pasting the SHA1 hash value of a file, for example, copied from other interfaces of Xcitium. You can also use this interface to view the details and events involved with a file of interest from other interfaces directly. Example include:

    • 'Alerts' > 'Alert Search' > expand an event / alert > click on a file hash / process hash value > 'Show File in Hash Search'

    • 'Alerts' > 'Hash View' > click on a file hash value

    • 'Alerts' > 'Hash View' > 'Alert Actions' in the row of a file > 'File Details'

    • 'Investigate' > 'Event Search' > click on a file hash / process hash value in an event result > 'Show File in Hash Search'

The 'Hash Search' interface shows the complete details of a file along with events it generated on various devices.




The interface contains following panes:

  • File Details

  • File Trajectory

  • Execution Summary

  • Download Summary

  • Creation Summary

  • Execution Trend

  • List of Quarantined Devices

  • List of Autorun Disabled Devices

  • Alert Counts

File Details


The top pane shows the details of the file. You can also check the Valkyrie file analysis details and change admin rating of the file.




  • File Type - The nature of file. For example, an executable.

  • Entry Point - The name of the device on which the file was first detected. 

  • Click the device name to view the summary of events detected on that device. This opens the 'Investigate' > 'Device Search' screen with the device pre-selected. 

  • File Name - The label of the file. 

  • Click the file name to view the details of events generated by the same file in all devices. This opens the 'Investigate' > 'Event Search' screen with the file name pre-populated as the search criteria. 

  • First Seen On - The date and time of an event was first logged by the file and the name of the device on which it was detected. 

  • Click the device name to view the summary of events detected on that device. This opens the 'Investigate' > 'Device Search' screen with the device pre-selected. 

  • Last Seen On - The date and time of the most recent event logged by same file and the name of the device on which it was detected.

    • Click the device name to view the summary of events detected on that device. This opens the 'Investigate' > 'Device Search' screen with the device pre-selected. 

  • Seen On - The number of devices on which the file was found.

  • Xcitium Rating - The file's trust level as per the Xcitium File Look-up service, reported by the XCS installations at the endpoints. Files are rated as trusted, malicious or unrecognized.

  • Admin Rating - The trust rating of the file as set by the administrator. You can set a rating to the file from this interface too. See Rate Files as Trusted, Malicious or Unrecognized for more details.

  • Detection Time - The date and time the trust verdict was awarded to the file. This may be some time in the past if Valkyrie has already encountered the file and has a database entry for it.

The pane also lets you:

  • Download Valkyrie Report - Get a detailed Valkyrie analysis report for a file as a PDF. 

  • Click 'Download as Valkyrie Report'.

  • See Get Valkyrie Report of a file for more details. 

  • Check Valkyrie Details - View the Valkyrie analysis on a file. 

  • Click 'Check Valkyrie Details'

  • See View Valkyrie analysis details of file for more details. 

  • Rate Files as Trusted, Malicious or Unrecognized - If required, you can rate the files affected by the events as unrecognized, trusted or malicious. Please make sure before marking a file as trusted. Any new file ratings will be sent to endpoints during the next sync. 

  • Click the 'Change Rating' button

  • Set your preferred rating from the options:



The new rating will be propagated to all endpoints during the next synchronization.


File Trajectory


The 'File Trajectory' tile shows the movement of the file on the endpoints and actions executed on them.. You can also view the process creation events, alerts generated and detection events involving the file on the endpoint.




The timeline graph shows the history of the file, with details like how it was downloaded / copied to the device and actions of XCS security components on the device. The legend of the icons used in the graph is shown below the chart.

  • Use your mouse to zoom-in or zoom-out the chart

  • Click on an icon in the chart to view the details of that event



  • Use the slider switch to view the process creation events, alerts and detection events involved with the file.



  • Click on an event in the chart to view its details



Execution Summary


A summary of the devices on which the file was executed. Details include the file path and the number of times it was executed.




  • Use the calendar drop-down at the top right to filter the events by time.

  • Click the execution path or execution count on a device to view the respective execution events. This opens the 'Investigate' > 'Event Search' interface with a query automatically created to view the events. See Search Events by Query for more on details shown on that interface.

Download Summary


The details of the endpoints on which the file was downloaded (aka 'Entry Point'), the URL from where it was downloaded and the number of times it was downloaded.


  • Select the time-period for which the download summary should be shown. The period ranges from last 15 minutes to 30 days.

  • Downloaded On - The device on which the file was first downloaded

  • Downloaded From - The location from which the file was downloaded

  • Downloaded Count - The number of times the file was downloaded

Creation Summary


Details of endpoints on which the file has created processes and the location of file from where it was run.




  • Select the time-period for which the creation summary should be shown. The period ranges from last 15 minutes to 30 days.

  • Created On - The device on which the file was run

  • Location - The path of the file from where it was run

  • Process - The name of the application that was run

Execution Trend


Shows a time line of numbers of times the file was executed at various devices



  • Select the time-period for which the creation summary should be shown. The period ranges from last 15 minutes to 30 days.

  • Place you mouse on a point on the graph to see the number of executions at that time point.

List of Quarantined Devices


Shows the devices on which the file was moved to quarantine by the antivirus module of XCS.




 
     
  • Device Name - The label of the device on which the file is moved to quarantine
  • Time - The date and time at which the file was quarantined

  • You can view and manage quarantined items from the 'Security' > 'Endpoint Security' > 'Antivirus' > 'Quarantined Files' interface.

  • See View and Manage Quarantined Items for more help on this.

List of Autorun Disabled Devices


Shows the devices on which the file was removed from the list of autorun items by the boot protection feature of Xcitium Client Security (XCS).

  • You can view and manage blocked autorun items from the 'Security' > 'Endpoint Security' > 'Antivirus' > 'Autorun Items' interface.

  • See View and Manage Autorun Items for more help on this.

Alert Counts


The numbers of alerts generated by various XCS and Xcitium security modules for the events generated by the file.




  • Select the time-period for which the creation summary should be shown. The period ranges from last 15 minutes to 30 days.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.